File name:

lnk.txt

Full analysis: https://app.any.run/tasks/3af2a311-451a-45fe-9c90-381c6d4af397
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 08, 2025, 21:49:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
Indicators:
MIME: text/x-php
File info: PHP script, ASCII text, with no line terminators
MD5:

FB2D66840456FCC1CEA65CEA7669C491

SHA1:

F43B00BB18A14FD331B0EFD4C2940B767E6B0ADD

SHA256:

132BB47F30F6EC105FCE98B8E233923548A9E4DCF5B1D0A2090A4CF82C0EB8EC

SSDEEP:

3:3/v7WSJJLNyqrFjFeTVNchzfetSBlUrRwJAFWGYWUXURvI:Ltny6khNUJBl8RwtVWUkRw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the date of Windows installation

      • pwsh.exe (PID: 7160)
    • Process requests binary or script from the Internet

      • pwsh.exe (PID: 7160)
    • Connects to the server without a host name

      • pwsh.exe (PID: 7160)
  • INFO

    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 2072)
      • notepad.exe (PID: 6904)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 2072)
    • The process uses the downloaded file

      • OpenWith.exe (PID: 2072)
      • pwsh.exe (PID: 7160)
    • Reads the computer name

      • pwsh.exe (PID: 7160)
    • Checks supported languages

      • pwsh.exe (PID: 7160)
    • Process checks computer location settings

      • pwsh.exe (PID: 7160)
    • Manual execution by a user

      • pwsh.exe (PID: 7160)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.php | PHP source (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start openwith.exe no specs notepad.exe no specs pwsh.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2072"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\AppData\Local\Temp\lnk.txt.phpC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5432\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepwsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6904"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\lnk.txt.phpC:\Windows\System32\notepad.exeOpenWith.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7160"C:\Program Files\PowerShell\7\pwsh.exe" -WorkingDirectory ~C:\Program Files\PowerShell\7\pwsh.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
pwsh
Version:
7.3.5.500
Modules
Images
c:\program files\powershell\7\pwsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
6 396
Read events
6 396
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
9
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
7160pwsh.exeC:\Users\admin\AppData\Local\Microsoft\PowerShell\7.3.5\update1_v7.4.6_2024-10-24
MD5:
SHA256:
7160pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RRAE2TSSQL94PX3GTVXE.tempbinary
MD5:8F9045F622186871EC04D1A44859DA5E
SHA256:8F9FA744176F54A0ADFA05EEB8B94E9E2E1C31E6F13C9BFA203DB6FE988F2D3E
7160pwsh.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5qwuko11.21u.ps1text
MD5:3662DE7F322A128CCC430C5A2D4DF83C
SHA256:420842E51A7FA0A11137301293E47BA5FF3D3D11E18FBD4E77E61AFCDBAACC4C
7160pwsh.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C0018BB1B5834735BFA60CD063B31956binary
MD5:3E3AED1C0BA46C98A8EF6B3BEC083998
SHA256:3FAB079F84B987B1A1E305228BD9D2C7DC9A4033B62D3715073C009391FC949F
7160pwsh.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
7160pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3c3871276e149215.customDestinations-msbinary
MD5:8F9045F622186871EC04D1A44859DA5E
SHA256:8F9FA744176F54A0ADFA05EEB8B94E9E2E1C31E6F13C9BFA203DB6FE988F2D3E
7160pwsh.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline\ConsoleHost_history.txttext
MD5:9053BD65A9E0590273941D409CB0E03F
SHA256:5B869E9BF584EA4059C165C0454DD4034714560A2956B5C909ABE6CC8DBBC2E9
7160pwsh.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C0018BB1B5834735BFA60CD063B31956binary
MD5:FA72E170B504079BBC003626F86E88D4
SHA256:98D7BD14788C9C6558BA4E0C5FDA9CA2B2359F7341C121FF69DCD1364C81127F
7160pwsh.exeC:\Users\admin\AppData\Local\Microsoft\PowerShell\StartupProfileData-Interactivebinary
MD5:5A545AD17301EEF073FCE8FCE21BF555
SHA256:86E0BE87447D94F9DF2CF6DFE33E80C33267E05C8433EB20FF2F3657B6A12671
7160pwsh.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4r5b1tjq.ng0.psm1text
MD5:3662DE7F322A128CCC430C5A2D4DF83C
SHA256:420842E51A7FA0A11137301293E47BA5FF3D3D11E18FBD4E77E61AFCDBAACC4C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
50
DNS requests
26
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2380
svchost.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2380
svchost.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7160
pwsh.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7160
pwsh.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
4144
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2380
svchost.exe
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2380
svchost.exe
23.37.237.227:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.16.204.155:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.147
  • 23.48.23.145
  • 23.48.23.166
  • 23.48.23.143
  • 23.48.23.173
  • 23.48.23.167
  • 23.48.23.156
  • 23.48.23.180
whitelisted
www.microsoft.com
  • 23.37.237.227
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.bing.com
  • 2.16.204.155
  • 2.16.204.153
  • 2.16.204.158
  • 2.16.204.149
  • 2.16.204.150
  • 2.16.204.145
  • 2.16.204.148
  • 2.16.204.146
  • 2.16.204.138
  • 2.16.204.134
  • 2.16.204.141
  • 2.16.204.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.0
  • 20.190.159.75
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
r.bing.com
  • 2.16.204.141
  • 2.16.204.134
  • 2.16.204.161
  • 2.16.204.155
  • 2.16.204.138
  • 2.16.204.158
  • 2.16.204.148
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted

Threats

PID
Process
Class
Message
7160
pwsh.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
7160
pwsh.exe
Potentially Bad Traffic
ET INFO PS1 Powershell File Request
1 ETPRO signatures available at the full report
No debug info